{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,13]],"date-time":"2026-03-13T08:56:27Z","timestamp":1773392187859,"version":"3.50.1"},"reference-count":145,"publisher":"SAGE Publications","issue":"2","license":[{"start":{"date-parts":[[2023,7,1]],"date-time":"2023-07-01T00:00:00Z","timestamp":1688169600000},"content-version":"unspecified","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc\/4.0\/"}],"content-domain":{"domain":["journals.sagepub.com"],"crossmark-restriction":true},"short-container-title":["Big Data &amp; Society"],"published-print":{"date-parts":[[2023,7]]},"abstract":"<jats:p> Power and information asymmetries between people and digital technology companies are further legitimized through contractual agreements that fail to provide meaningful consent and contestability. In particular, the Terms-of-Service (ToS) agreement, is a contract of adhesion where companies effectively set the terms and conditions of the contract. Whereas, ToS reinforce existing structural inequalities, we seek to enable an intersectional accountability mechanism grounded in the practice of algorithmic reparation. Building on existing critiques of ToS in the context of algorithmic systems, we return to the roots of contract theory by recentering notions of agency and mutual assent. We evolve a multipronged intervention we frame as the Terms-we-Serve-with (TwSw) social, computational, and legal framework. The TwSw is a new social imaginary centered on: (1) co-constitution of user agreements, through participatory mechanisms; (2) addressing friction, leveraging the fields of design justice and critical design in the production and resolution of conflict; (3) enabling refusal mechanisms, reflecting the need for a sufficient level of human oversight and agency including opting out; (4) complaint and algorithmic harms reporting, through a feminist studies lens and open-sourced computational tools; and (5) disclosure-centered mediation, to disclose, acknowledge, and take responsibility for harm, drawing on the field of medical law. We further inform our analysis through an exploratory design workshop with a South African gender-based violence reporting AI startup. We derive practical strategies for communities, technologists, and policy-makers to leverage a relational approach to algorithmic reparation and propose there's a need for a radical restructuring of the \u201ctake-it-or-leave-it\u201d ToS agreement. <\/jats:p>","DOI":"10.1177\/20539517231211553","type":"journal-article","created":{"date-parts":[[2023,11,16]],"date-time":"2023-11-16T05:32:05Z","timestamp":1700112725000},"update-policy":"https:\/\/doi.org\/10.1177\/sage-journals-update-policy","source":"Crossref","is-referenced-by-count":11,"title":["Terms-we-serve-with: Five dimensions for anticipating and repairing algorithmic harm"],"prefix":"10.1177","volume":"10","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-3130-689X","authenticated-orcid":false,"given":"Bogdana","family":"Rakova","sequence":"first","affiliation":[{"name":"Mozilla Foundation, San Francisco, CA, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4720-3844","authenticated-orcid":false,"given":"Renee","family":"Shelby","sequence":"additional","affiliation":[{"name":"Google Research, Mountain View, CA, USA"},{"name":"Australia National University, Justice and Technoscience Lab, Canberra, Australia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9488-6302","authenticated-orcid":false,"given":"Megan","family":"Ma","sequence":"additional","affiliation":[{"name":"Stanford Center for Legal Informatics (CodeX) Stanford Law School, Stanford, USA"}]}],"member":"179","published-online":{"date-parts":[[2023,11,15]]},"reference":[{"key":"bibr1-20539517231211553","volume-title":"Complaint!","author":"Ahmed S","year":"2021"},{"key":"bibr2-20539517231211553","doi-asserted-by":"publisher","DOI":"10.2139\/ssrn.3765908"},{"key":"bibr3-20539517231211553","author":"Angwin J","year":"2011","journal-title":"The Wall Street Journal"},{"key":"bibr4-20539517231211553","doi-asserted-by":"publisher","DOI":"10.1145\/3452118"},{"key":"bibr5-20539517231211553","doi-asserted-by":"publisher","DOI":"10.17351\/ests2022.1233"},{"key":"bibr6-20539517231211553","first-page":"62","volume":"81","author":"Barabas C","journal-title":"In Proceedings of the 1st Conference on Fairness, Accountability and Transparency"},{"key":"bibr7-20539517231211553","unstructured":"Barocas S, Hardt M, Narayanan A (2019) Fairness and Machine Learning. Fairmlbook.org."},{"key":"bibr8-20539517231211553","doi-asserted-by":"publisher","DOI":"10.1177\/2053951717718854"},{"key":"bibr9-20539517231211553","doi-asserted-by":"publisher","DOI":"10.14763\/2016.4.441"},{"key":"bibr10-20539517231211553","doi-asserted-by":"publisher","DOI":"10.2139\/ssrn.1162922"},{"key":"bibr11-20539517231211553","doi-asserted-by":"publisher","DOI":"10.2139\/ssrn.1484928"},{"key":"bibr12-20539517231211553","doi-asserted-by":"publisher","DOI":"10.1177\/0162243916656059"},{"key":"bibr13-20539517231211553","doi-asserted-by":"publisher","DOI":"10.1126\/science.aaz3873"},{"key":"bibr14-20539517231211553","volume-title":"Race After Technology: Abolitionist Tools for the New Jim Code","author":"Benjamin R","year":"2020"},{"key":"bibr15-20539517231211553","volume":"125","author":"Bennett CL","year":"2020","journal-title":"ACM SIGACCESS Accessibility and Computing"},{"key":"bibr16-20539517231211553","volume-title":"In Proceedings of the 28th European Conference on Information Systems (ECIS), An Online AIS Conference","author":"Bergram K","year":"2020"},{"key":"bibr17-20539517231211553","doi-asserted-by":"publisher","DOI":"10.1016\/j.patter.2021.100205"},{"key":"bibr18-20539517231211553","first-page":"1","author":"Birhane A","year":"2022","journal-title":"Equity and Access in Algorithms, Mechanisms, and Optimization"},{"key":"bibr19-20539517231211553","unstructured":"Boyarskaya M, Olteanu A, Crawford K (2020) Overcoming failures of imagination in AI infused system development and deployment. arXiv preprint: arXiv:2011.13416."},{"key":"bibr20-20539517231211553","doi-asserted-by":"publisher","DOI":"10.4324\/9780203108543.ch7"},{"key":"bibr21-20539517231211553","doi-asserted-by":"publisher","DOI":"10.1080\/14780887.2020.1769238"},{"issue":"4","key":"bibr22-20539517231211553","first-page":"515","volume":"17","author":"Bruening PJ","year":"2015","journal-title":"North Carolina Journal of Law & Technology"},{"key":"bibr23-20539517231211553","first-page":"77","volume":"81","author":"Buolamwini J","year":"2018","journal-title":"Proceedings of the 2018 Conference on Fairness, Accountability and Transparency"},{"key":"bibr24-20539517231211553","first-page":"168","volume-title":"Research Handbook on Governance of the Internet","author":"Bygrave LA","year":"2012"},{"key":"bibr25-20539517231211553","unstructured":"Carceral Tech Resistance Network (2020). Available at: https:\/\/www.carceral.tech\/ (accessed 20 February, 2022)."},{"issue":"5","key":"bibr26-20539517231211553","first-page":"27354","volume":"17","author":"Chipidza FE","year":"2015","journal-title":"The Primary Care Companion for CNS Disorders"},{"issue":"3","key":"bibr27-20539517231211553","first-page":"1","volume":"26","author":"Chung S","year":"2022","journal-title":"The Design Journal"},{"key":"bibr28-20539517231211553","unstructured":"Cifor M, Garcia P, Cowan TL, et al. (2019) Feminist Data Manifest-No. Available at: https:\/\/www.manifestno.com\/ (accessed 20 February, 2022)."},{"key":"bibr29-20539517231211553","first-page":"1425","volume":"108","author":"Cohen IG","year":"2020","journal-title":"The Georgetown Law Journal"},{"key":"bibr30-20539517231211553","doi-asserted-by":"publisher","DOI":"10.4324\/9780203900055"},{"key":"bibr31-20539517231211553","doi-asserted-by":"publisher","DOI":"10.1145\/3593013.3594104"},{"key":"bibr32-20539517231211553","doi-asserted-by":"publisher","DOI":"10.7551\/mitpress\/12255.001.0001"},{"key":"bibr33-20539517231211553","doi-asserted-by":"publisher","DOI":"10.1145\/3531146.3533213"},{"key":"bibr34-20539517231211553","doi-asserted-by":"publisher","DOI":"10.7551\/mitpress\/11967.001.0001"},{"key":"bibr35-20539517231211553","doi-asserted-by":"publisher","DOI":"10.1145\/3593013.3594000"},{"key":"bibr36-20539517231211553","doi-asserted-by":"publisher","DOI":"10.1177\/20539517211044808"},{"key":"bibr3006-20539517231211553","doi-asserted-by":"publisher","DOI":"10.1145\/3512898"},{"key":"bibr37-20539517231211553","doi-asserted-by":"publisher","DOI":"10.1145\/3476080"},{"key":"bibr38-20539517231211553","first-page":"182","volume-title":"The Routledge International Handbook of Participatory Design","author":"DiSalvo C","year":"2012"},{"key":"bibr39-20539517231211553","unstructured":"Disalvo C, Lukens J (2009) Towards a critical technological fluency: The confluence of speculative design and community technology programs. UC Irvine: Digital Arts and Culture 2009. Available at: https:\/\/escholarship.org\/uc\/item\/7jz308ws"},{"key":"bibr40-20539517231211553","volume-title":"Speculative everything: design, fiction, and social dreaming","author":"Dunne A","year":"2013"},{"key":"bibr41-20539517231211553","doi-asserted-by":"publisher","DOI":"10.7551\/mitpress\/9874.001.0001"},{"issue":"2","key":"bibr42-20539517231211553","first-page":"381","volume":"41","author":"Eigen ZJ","year":"2008","journal-title":"Connecticut Law Review"},{"key":"bibr43-20539517231211553","doi-asserted-by":"publisher","DOI":"10.1628\/093245612799440050"},{"key":"bibr44-20539517231211553","volume-title":"Automating Inequality: How High-Tech Tools Profile, Police, and Punish the Poor","author":"Eubanks V","year":"2018"},{"key":"bibr44a-20539517231211553","unstructured":"EULAs of Despair (2023). Pilot Lab, PennState Law, Policy, and Engineering Initiative. Available at: https:\/\/www.pilotlab.org\/eulas-of-despair."},{"key":"bibr45-20539517231211553","unstructured":"Feminist Principles of the Internet (2014). Available at: https:\/\/feministinternet.org\/en\/principles (accessed 20 February 2022)."},{"key":"bibr46-20539517231211553","doi-asserted-by":"crossref","unstructured":"Feng Y, Yao Y, Sadeh N (2021) A design space for privacy choices: Towards meaningful privacy control in the internet of things. In Proceedings of the 2021 CHI Conference on Human Factors in Computing Systems. May 8-13, Online Virtual Conference. pp. 1\u201316.","DOI":"10.1145\/3411764.3445148"},{"key":"bibr47-20539517231211553","doi-asserted-by":"publisher","DOI":"10.1609\/icwsm.v14i1.7290"},{"key":"bibr48-20539517231211553","doi-asserted-by":"publisher","DOI":"10.1145\/2818048.2819931"},{"key":"bibr49-20539517231211553","doi-asserted-by":"publisher","DOI":"10.1145\/2858036.2858409"},{"key":"bibr50-20539517231211553","doi-asserted-by":"publisher","DOI":"10.1177\/1524839919899924"},{"key":"bibr51-20539517231211553","doi-asserted-by":"publisher","DOI":"10.1145\/2487575.2488202"},{"key":"bibr52-20539517231211553","doi-asserted-by":"publisher","DOI":"10.1177\/2055207618785077"},{"key":"bibr53-20539517231211553","doi-asserted-by":"publisher","DOI":"10.1177\/1329878X221076288"},{"key":"bibr54-20539517231211553","doi-asserted-by":"publisher","DOI":"10.1145\/3557997"},{"key":"bibr55-20539517231211553","first-page":"119","author":"Gordon-Tapiero A","year":"2022","journal-title":"Vanderbilt Journal of Entertainment & Technology Law"},{"key":"bibr56-20539517231211553","doi-asserted-by":"publisher","DOI":"10.1145\/3351095.3372840"},{"key":"bibr57-20539517231211553","first-page":"1","author":"Griffin D","year":"2022","journal-title":"New Media & Society"},{"key":"bibr58-20539517231211553","doi-asserted-by":"publisher","DOI":"10.1162\/desi_a_00600"},{"key":"bibr59-20539517231211553","doi-asserted-by":"publisher","DOI":"10.1080\/14680777.2019.1678505"},{"issue":"1","key":"bibr60-20539517231211553","first-page":"1","volume":"5","author":"Hamraie A","year":"2019","journal-title":"Catalyst: Feminism, Theory, Technoscience"},{"key":"bibr61-20539517231211553","doi-asserted-by":"publisher","DOI":"10.2307\/3178066"},{"issue":"1","key":"bibr62-20539517231211553","first-page":"1","volume":"41","author":"Hart DK","year":"2011","journal-title":"University of Baltimore Law Review"},{"key":"bibr63-20539517231211553","doi-asserted-by":"publisher","DOI":"10.1098\/rsta.2017.0355"},{"key":"bibr64-20539517231211553","first-page":"574","volume":"122","author":"Ho DE","year":"2012","journal-title":"The Yale Law Journal"},{"key":"bibr65-20539517231211553","doi-asserted-by":"publisher","DOI":"10.1080\/1369118X.2019.1573912"},{"key":"bibr66-20539517231211553","doi-asserted-by":"publisher","DOI":"10.1177\/1461444820958725"},{"key":"bibr67-20539517231211553","doi-asserted-by":"publisher","DOI":"10.1177\/1094670503254288"},{"key":"bibr68-20539517231211553","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-15-5784-2_12"},{"key":"bibr69-20539517231211553","doi-asserted-by":"publisher","DOI":"10.1145\/3375627.3375859"},{"key":"bibr70-20539517231211553","doi-asserted-by":"publisher","DOI":"10.1145\/3351095.3372874"},{"key":"bibr71-20539517231211553","unstructured":"Kenway J, Fran\u00e7ois C, Costanza-Chock S, et al. (2022) Bug bounties for algorithmic harms: Lessons from cybersecurity vulnerability disclosure for algorithmic harms discovery, disclosure, and redress. Algorithmic Justice League. Available at: https:\/\/www.ajl.org\/bugs (accessed 21 February 2023)."},{"issue":"3","key":"bibr72-20539517231211553","first-page":"70","volume":"32","author":"Khalid H","year":"2014","journal-title":"IEEE Xplore"},{"issue":"1","key":"bibr73-20539517231211553","first-page":"1","volume":"18","author":"Kirsch MS","year":"2011","journal-title":"Richmond Journal of Law & Technology"},{"key":"bibr74-20539517231211553","unstructured":"Klobuchar A (2018) S. 1989\u2013116th Congress (2017-2018): Honest Ads Act. In Congress. gov, June (Vol. 26)."},{"key":"bibr75-20539517231211553","doi-asserted-by":"publisher","DOI":"10.1073\/pnas.1915768117"},{"key":"bibr76-20539517231211553","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-10-2915-8"},{"key":"bibr77-20539517231211553","doi-asserted-by":"publisher","DOI":"10.1145\/3442188.3445938"},{"key":"bibr78-20539517231211553","unstructured":"Kwanele (2023) Kwanele - Bringing Women Justice. Available at: https:\/\/kwanelesouthafrica.org\/. (accessed 21 February 2023)."},{"key":"bibr79-20539517231211553","first-page":"1","volume":"3","author":"Lee MK","year":"2019","journal-title":"Proceedings of the 2019 ACM on Human-Computer Interaction"},{"key":"bibr80-20539517231211553","unstructured":"Lee U (2017) The building consentful tech zine is out! Available at: https:\/\/www.andalsotoo.net\/2017\/10\/24\/the-building-consentful-tech-zine-is-out\/ (accessed 21 February 2023)."},{"key":"bibr81-20539517231211553","doi-asserted-by":"publisher","DOI":"10.2139\/ssrn.4184946"},{"issue":"1","key":"bibr82-20539517231211553","first-page":"57","volume":"63","author":"Leonhard C","year":"2012","journal-title":"Case Western Reserve Law Review"},{"key":"bibr83-20539517231211553","volume-title":"In Proceedings of the 2015 British HCI Conference.","author":"Lindley J"},{"key":"bibr84-20539517231211553","volume-title":"The Equality Machine: Harnessing Digital Technology for a Brighter, More Inclusive Future","author":"Lobel O","year":"2022"},{"key":"bibr85-20539517231211553","doi-asserted-by":"publisher","DOI":"10.1145\/2470654.2481371"},{"key":"bibr86-20539517231211553","doi-asserted-by":"publisher","DOI":"10.1111\/j.1740-1461.2007.00104.x"},{"key":"bibr87-20539517231211553","doi-asserted-by":"publisher","DOI":"10.1145\/3359183"},{"key":"bibr88-20539517231211553","unstructured":"Matias JN, Johnson A, Boesel WE, et al. (2015) Reporting, reviewing, and responding to harassment on Twitter. arXiv preprint arXiv:1505.03359."},{"key":"bibr89-20539517231211553","doi-asserted-by":"publisher","DOI":"10.3389\/frai.2021.725911"},{"key":"bibr90-20539517231211553","doi-asserted-by":"crossref","unstructured":"Metcalf J, Moss E, Singh R, et al. (2022) \u201cA relationship and not a thing: A relational approach to algorithmic accountability and assessment documentation.\u201d arXiv preprint arXiv:2203.01455.","DOI":"10.1145\/3593013.3594092"},{"key":"bibr91-20539517231211553","doi-asserted-by":"publisher","DOI":"10.1177\/2053951720948087"},{"key":"bibr92-20539517231211553","unstructured":"Microsoft (2022) Microsoft Responsible AI Standard, v2. (Jun 2022)."},{"key":"bibr93-20539517231211553","doi-asserted-by":"publisher","DOI":"10.1007\/s13347-020-00405-8"},{"key":"bibr94-20539517231211553","unstructured":"Mozilla (2023) *Privacy not included. Available at: https:\/\/foundation.mozilla.org\/en\/privacynotincluded\/about\/why\/. (accessed 21 February 2023)."},{"key":"bibr95-20539517231211553","unstructured":"Mozilla (2019) Trustworthy AI Working Groups. Available at: https:\/\/www.mozillafestival.org\/en\/working-groups\/. (accessed 5 September 2023)."},{"key":"bibr96-20539517231211553","unstructured":"Nguyen S, McNealy J (2021) \u201cI, obscura:\u201d Illuminating deceptive design patterns in the wild. UCLA Center for Critical Internet Inquiry. Available at: https:\/\/www.c2i2.ucla.edu\/2021\/07\/15\/i-obscura-a-dark-pattern-zine-launched-from-stanford-and-ucla\/ (accessed 21 February 2023)."},{"key":"bibr97-20539517231211553","doi-asserted-by":"publisher","DOI":"10.18574\/nyu\/9781479833641.001.0001"},{"key":"bibr98-20539517231211553","doi-asserted-by":"publisher","DOI":"10.1145\/3531146.3533133"},{"key":"bibr99-20539517231211553","doi-asserted-by":"publisher","DOI":"10.1080\/1369118X.2018.1486870"},{"issue":"2","key":"bibr100-20539517231211553","first-page":"281","volume":"12","author":"Onwuegbuzie AJ","year":"2007","journal-title":"Qualitative Report"},{"key":"bibr101-20539517231211553","unstructured":"Our Data Bodies (2019) Digital defense playbook. Available at: https:\/\/www.odbproject.org\/tools\/. (accessed 21 February 2023)."},{"key":"bibr102-20539517231211553","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.2015.7332474"},{"key":"bibr103-20539517231211553","doi-asserted-by":"publisher","DOI":"10.1145\/3531146.3533158"},{"key":"bibr104-20539517231211553","doi-asserted-by":"publisher","DOI":"10.1145\/3514094.3534181"},{"key":"bibr105-20539517231211553","first-page":"229","volume-title":"Ethics: Contemporary Reading","author":"Rawls J","year":"2004"},{"issue":"1","key":"bibr106-20539517231211553","first-page":"39","volume":"30","author":"Reidenberg JR","year":"2015","journal-title":"Berkeley Technology Law Journal"},{"key":"bibr107-20539517231211553","doi-asserted-by":"publisher","DOI":"10.1007\/s11999-008-0580-1"},{"key":"bibr108-20539517231211553","volume-title":"22nd International Legal Infomatics Symposium IRIS 2019","author":"Rossi A","year":"2019"},{"key":"bibr109-20539517231211553","first-page":"181","volume":"317","author":"Rossi A","year":"2019","journal-title":"Knowledge of the Law in the Big Data Age"},{"key":"bibr110-20539517231211553","volume-title":"In Proceedings of the 2021 ACM Conference on Fairness, Accountability, and Transparency.","author":"Sambasivan N"},{"key":"bibr111-20539517231211553","doi-asserted-by":"publisher","DOI":"10.1109\/TTS.2021.3052127"},{"issue":"5","key":"bibr112-20539517231211553","first-page":"1","volume":"4","author":"Sharp D","year":"2022","journal-title":"Data & Policy"},{"key":"bibr113-20539517231211553","doi-asserted-by":"publisher","DOI":"10.1145\/3600211.3604673"},{"key":"bibr114-20539517231211553","doi-asserted-by":"publisher","DOI":"10.1145\/3479577"},{"key":"bibr115-20539517231211553","doi-asserted-by":"publisher","DOI":"10.1145\/3531146.3533110"},{"key":"bibr116-20539517231211553","doi-asserted-by":"publisher","DOI":"10.2196\/30986"},{"key":"bibr117-20539517231211553","volume-title":"In Proceedings of the ACM on Participatory Design Conference 2008","author":"Shilton K","year":"2008"},{"key":"bibr118-20539517231211553","first-page":"1","volume-title":"The Routledge International Handbook of Participatory Design","author":"Simonsen J","year":"2013"},{"key":"bibr119-20539517231211553","first-page":"1","volume":"14","author":"Sloan RH","year":"2014","journal-title":"Suffolk University Journal of High Tech Law"},{"key":"bibr120-20539517231211553","unstructured":"Sloane M, Moss E, Awomolo O, et al. (2020) Participation is not a design fix for machine learning. arXiv preprint arXiv:2007.02423."},{"key":"bibr121-20539517231211553","doi-asserted-by":"publisher","DOI":"10.1145\/3531146.3533160"},{"key":"bibr122-20539517231211553","first-page":"1880","volume":"126","author":"Solove DJ","year":"2012","journal-title":"Harvard Law Review"},{"key":"bibr123-20539517231211553","unstructured":"Stanley J (2017) Pitfalls of artificial intelligence decision making highlighted in idaho. ACLU Case. ACLU Blogs. Available at: https:\/\/www.aclu.org\/blog\/privacy-technology\/pitfalls-artificial-intelligence-decisionmaking-highlighted-idaho-aclu-case. (accessed 21 February 2023)."},{"key":"bibr124-20539517231211553","doi-asserted-by":"publisher","DOI":"10.1136\/amiajnl-2013-002605"},{"key":"bibr125-20539517231211553","unstructured":"Terms of Service Didn\u2019t Read (2023) About us. Available at: https:\/\/tosdr.org\/en\/about. (accessed 21 February 2023)."},{"key":"bibr126-20539517231211553","volume-title":"Companion Proceedings of the Web Conference 2018.","author":"Tesfay WB","year":"2018"},{"key":"bibr127-20539517231211553","unstructured":"Trahan L (2021) S. 1989\u2013117th Congress (2021-2022): Social Media Disclosure and Transparency Act. In Congress."},{"key":"bibr128-20539517231211553","doi-asserted-by":"publisher","DOI":"10.1017\/9781108891325.015"},{"key":"bibr129-20539517231211553","unstructured":"UNESCO (2021) Recommendation on the ethics of artificial intelligence. Available at: https:\/\/unesdoc.unesco.org\/ark:\/48223\/pf0000381137. (accessed 28 August 2023)."},{"key":"bibr130-20539517231211553","unstructured":"UN General Assembly (2007) United Nations Declaration on the Rights of Indigenous Peoples : resolution \/ adopted by the General Assembly, 2 October 2007, A\/RES\/61\/295. Available at: https:\/\/www.refworld.org\/docid\/471355a82.html. (accessed 21 February 2023)."},{"key":"bibr131-20539517231211553","volume-title":"In Proceedings of 2015 CSCW Workshop on Ethics for Studying Sociotechnical Systems in a Big Data World","author":"Vaccaro K","year":"2015"},{"key":"bibr132-20539517231211553","doi-asserted-by":"crossref","unstructured":"Vaccaro K, Sandvig C, Karahalios K (2020) \u201cAt the end of the day Facebook does what it wants:\u201d How users experience contesting algorithmic content moderation. In Proceedings of the ACM on Human-Computer Interaction 4(CSCW2). pp. 1\u201322.","DOI":"10.1145\/3415238"},{"key":"bibr133-20539517231211553","doi-asserted-by":"publisher","DOI":"10.1007\/978-94-007-6970-0_33"},{"key":"bibr134-20539517231211553","doi-asserted-by":"publisher","DOI":"10.14763\/2021.4.1602"},{"key":"bibr135-20539517231211553","first-page":"573","volume":"131","author":"Viljoen S","year":"2021","journal-title":"The Yale Law Journal"},{"key":"bibr136-20539517231211553","unstructured":"Vincent J (2021) Facebook bans academics who researched ad transparency and misinformation on Facebook. The Verge, 4 August. Available at: https:\/\/www.theverge.com\/2021\/8\/4\/22609020\/facebook-bans-academic-researchers-ad-transparency-misinformation-nyu-ad-observatory-plug-in. (accessed 21 February 2023)."},{"key":"bibr137-20539517231211553","doi-asserted-by":"publisher","DOI":"10.1111\/j.1571-9979.2012.00336.x"},{"key":"bibr138-20539517231211553","doi-asserted-by":"publisher","DOI":"10.1613\/jair.1.13196"},{"key":"bibr139-20539517231211553","doi-asserted-by":"publisher","DOI":"10.31235\/osf.io\/pdcrm"},{"key":"bibr140-20539517231211553","doi-asserted-by":"publisher","DOI":"10.1145\/3134746"},{"key":"bibr141-20539517231211553","doi-asserted-by":"publisher","DOI":"10.1177\/2043820618780570"},{"key":"bibr142-20539517231211553","doi-asserted-by":"publisher","DOI":"10.1177\/2053951719868492"},{"key":"bibr143-20539517231211553","doi-asserted-by":"publisher","DOI":"10.1177\/0163443720972314"}],"container-title":["Big Data &amp; Society"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/journals.sagepub.com\/doi\/pdf\/10.1177\/20539517231211553","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/journals.sagepub.com\/doi\/full-xml\/10.1177\/20539517231211553","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/journals.sagepub.com\/doi\/pdf\/10.1177\/20539517231211553","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,1]],"date-time":"2025-03-01T16:35:26Z","timestamp":1740846926000},"score":1,"resource":{"primary":{"URL":"http:\/\/journals.sagepub.com\/doi\/10.1177\/20539517231211553"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,7]]},"references-count":145,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2023,7]]}},"alternative-id":["10.1177\/20539517231211553"],"URL":"https:\/\/doi.org\/10.1177\/20539517231211553","relation":{},"ISSN":["2053-9517","2053-9517"],"issn-type":[{"value":"2053-9517","type":"print"},{"value":"2053-9517","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,7]]},"article-number":"20539517231211553"}}